• CameronDev@programming.dev
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 month ago

    Those all are things that require external human intervention though?

    If the malware is persistent, then one way or another it needs to leave an exploit on the device, it can either be a persistance exploit, or a privesc exploit.

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      3
      ·
      1 month ago

      Right so the issue here is we are saying for the class of malware that is not persistent restarting the device will take it out of memory. Which is a strict positive